Monday 2 March 2020

What is the intrusion detection system

The term IDS (Intrusion Detection System) refers to a mechanism that secretly listens to traffic on the network to detect abnormal or suspicious activity and, thus, reduce the risks of intrusion. There are two distinct families of IDS: the N-IDS (Network Based Intrusion Detection System - Network Intrusion Detection System), which guarantee security within the network and the H-IDS (Host Based Intrusion Detection System - Network Detection System) Host Intrusions), which ensure security on the host.

N-IDS needs exclusive hardware and is a system capable of verifying the information packets that circulate on one or more network connections to find out if any malicious or abnormal activity is taking place. N-IDS puts one or more network adapters exclusive to the system in anonymous mode so that they have neither an IP address nor an associated protocol stack. It is quite common to find several IDS in different parts of the network. In general, probes are placed outside the network to study possible attacks, as well as internal probes to analyze queries that have passed through the firewall or that have been carried out internally:

Scheme for locating N-IDS on a network

H-IDs are on a specific host. Therefore, its software covers a large part of operating systems, such as Windows, Solaris, HO-UX and Aix, Linux etc.

H-IDs act as a daemon or standard service on a host system. Traditionally, H-IDS analyzes the specific information stored in the logs (syslogs, messages, lastlog, wtmp etc.) in addition to capturing network packets that enter / leave the guest, to detect intrusion signals (such as denial of service attacks, backdoors, Trojans, unauthorized access attempts, malicious code execution, buffer overflow attacks).

1 comment:

  1. Are you Looking for a company to buy Fencing? Metal and Machine is the No. #1 Fence Contractor in UAE.

    ReplyDelete